Author of the publication

Classification of Malware Variant Based on Ensemble Learning.

, , , , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 125-139. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving tag generation for memory data authentication in embedded processor systems., , , and . ASP-DAC, page 50-55. IEEE, (2016)Enabling large decoded instruction loop caching for energy-aware embedded processors., and . CASES, page 247-256. ACM, (2010)Robust Norm Emergence by Revealing and Reasoning about Context: Socially Intelligent Agents for Enhancing Privacy., , , and . IJCAI, page 28-34. ijcai.org, (2018)Unrolling Loops With Indeterminate Loop Counts in System Level Pipelines., and . ASP-DAC, page 99-104. IEEE, (1998)Geographic Multipath Routing in Duty-Cycled Wireless Sensor Networks with Energy Harvesting., , , , and . GreenCom/iThings/CPScom, page 31-39. IEEE, (2013)Reducing Power and Energy Overhead in Instruction Prefetching for Embedded Processor Systems., and . IJHCR, 2 (4): 42-58 (2011)EATBit: Effective automated test for binary translation with high code coverage., , , and . DATE, page 1-6. European Design and Automation Association, (2014)Ambiguity Function Analysis of Wireless LAN Transmissions for Passive Radar., , , , and . IEEE Trans. Aerosp. Electron. Syst., 47 (1): 240-264 (2011)Toward extraction of security requirements from text: poster., , , , and . HotSoS, page 27:1. ACM, (2018)Outage Performance of Cognitive Multi-Hop Network under Interference Constraints over Nakagami-m Fading., , and . J. Commun., 11 (7): 686-692 (2016)